Destructive ICS attacks generally require specialized skill and resources, but initial reconnaissance to plan an attack requires little advanced capabilities. Learn how defenders can decrease their attack surface and increase adversary friction by developing an awareness of ICS-specific open source intelligence (OSINT) techniques and the type of freely available data adversaries use in attacks.
Human Element Hackers & Threats Analytics, Intelligence & Response
threat intelligence security awareness hackers & threats critical infrastructure
Share With Your Community